У нас вы можете посмотреть бесплатно Defend against cyber threats with these top security controls или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
In this episode of Red Canary Office Hours, special guest Matt Berninger, SVP at Marsh McLennan, joins the discussion to highlight his recent security controls report, explore the importance of incident response planning, and examine the evolving nature of cyber awareness training. Throughout the conversation, Matt emphasizes the critical role of understanding risk through data-driven insights, and he shares key findings from his team's research. He highlights that security breaches are multifaceted, often resulting from a series of failures, and advocates for a shift from industry myths to evidence-based analysis. The discussion also delves into joint research conducted by Zscaler and Red Canary, which underscores the role of RMM tools in cyber threats and the importance of communicating risk in business terms to organizational stakeholders. Overall, this dialogue aims to enhance the audience's understanding of cyber risks and improve decision-making through shared data and actionable insights. #cyberrisk #cyberriskmanagement #cybersecurityexperts #cybersecurity #securitycontrols Follow us: / redcanary / redcanary --- Red Canary stops cyber threats no one else does, so organizations can fearlessly pursue their missions. We do it by delivering managed detection and response (MDR) across enterprise endpoints, cloud workloads, network, identities, and SaaS apps. As a security ally, we define MDR in our own terms with unlimited 24×7 support, deep threat expertise, hands-on remediation, and by doing what’s right for customers and partners. Subscribe to our YouTube channel for frequently updated, how-to content about Atomic Red Team, threat hunting in security operations, MDR or Managed Detection and Response, and using the MITRE ATT&CK® framework.